🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

SPYWA RE GROUP 4 OUTLINE REPORT ON SPYWARE Spyware Definition Brief History of Spyware How do I get spyware? What Does Spyware...

SPYWA RE GROUP 4 OUTLINE REPORT ON SPYWARE Spyware Definition Brief History of Spyware How do I get spyware? What Does Spyware Do? Types of spyware Common problems that spyware can result Spyware Protection Conclusion What is Spyware? Spyware is malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent. A commonly accepted spyware definition is a strand of malware designed to access and damage a device without the user’s consent. What is Spyware? Spyware collects personal and sensitive information that it sends to advertisers, data collection firms, or malicious actors for a profit. Brief History of Spyware MARS NEPTUNE SATURN The first use of the term “spyware” appeared was on October 1995 in a Usenet article that targeted Microsoft's business model. In early 2000, it reappeared in a press release for a personal firewall product. This marked the beginning and acceptance of the “spyware” term. What Does Spyware Do? All types of spyware sit on a user’s device and spy on their activity, the sites they visit, and the data they amass or share. They do this with the objective of monitoring user activity, tracking login and password details, and detecting sensitive data. Step 1. Infiltrate Step 2. Monitor and capture Step 3. Send or sell Spyware can increasingly affect any device, from computers and laptops to mobile phones and tablets. Some of the most prominent causes of spyware infiltrating a device or system include: Security Misleading vulnerabilities marketing HOW DO I GET Software SPYWARE? bundles Phishing / spoofing Trojans TYPES OF SPYWARE 01 05 Adware Red Shell 02 Infostealer System monitors 06 03 Keyloggers Tracking cookies 07 04 Rootkits Trojan Horse Virus 08 Types of Spyware Attackers use various types of spyware to infect users’ computers and devices. Some of the most commonly used types of spyware include: 1. Adware - This sits on a device and monitors users’ activity then sells their data to advertisers and malicious actors or serves up malicious ads. 2. Infostealer - This is a type of spyware that collects information from devices. It scans them for specific data and instant messaging conversations. Types of Spyware Attackers use various types of spyware to infect users’ computers and devices. Some of the most commonly used types of spyware include: 3. Keyloggers - Also known as keystroke loggers, keyloggers are a type of infostealer spyware. They record the keystrokes that a user makes on their infected device, then save the data into an encrypted log file. 4. Rootkits - These enable attackers to deeply infiltrate devices by exploiting security vulnerabilities or logging into machines as an administrator. Rootkits are often difficult and even impossible to detect. Types of Spyware Attackers use various types of spyware to infect users’ computers and devices. Some of the most commonly used types of spyware include: 5. Red Shell - This spyware installs itself onto a device while a user is installing specific PC games, then tracks their online activity. It is generally used by developers to enhance their games and improve their marketing campaigns. 6. System monitors - These also track user activity on their computer, capturing information like emails sent, social media and other sites visited, and keystrokes. Types of Spyware Attackers use various types of spyware to infect users’ computers and devices. Some of the most commonly used types of spyware include: 7. Tracking cookies: Tracking cookies are dropped onto a device by a website and then used to follow the user’s online activity. 8. Trojan Horse Virus: This brand of spyware enters a device through Trojan malware, which is responsible for delivering the spyware program. Some specific MOBILE SPYWARE variants are:  PhoneSpy: installed in Android apps to steal login credentials, messages, location, and images  Pegasus: used to target activists, journalists, politicians, and executives A device can also become infected with spyware as a result of a user’s actions, such as: Accepting cookie consent requests Opening malicious from insecure attachments websites Accepting pop-ups Downloading games, from untrusted sites movies, or music from pirated or spoofed websites Clicking on malicious Downloading links malicious mobile apps Common problems that spyware can result in include 1. Data theft 2. Identity fraud 3. Device damage 4. Browsing MERCURY disruption Spyware Protection Spyware and other malicious attack methods are a constant threat to any device connected to the internet. Therefore, the first line of defense against spyware is to deploy an internet security solution that includes proactive anti-malware and antivirus detection. Spyware Protection There are several steps that can be taken to protect devices and systems:  Cookie consent  Browser extensions  Security updates  Avoid free software  Use secure networks  Best practice and behavior CONCLUSIO N Thank you for listening! All cited in https://www.fortinet.com/resources/cyberglossary/spyware#:~:text=Spyware%20is%20malicious%20 software%20that,device%20without%20the%20user's%20consent. Members Fronda, Kanakan, Ludas, Sheira Shane Sudays Mones, Dave Ondoy, Cristian

Use Quizgecko on...
Browser
Browser